Featured

Resilience 2025 Cyber Risk Report reveals evolving economics of extortion, material cyber losses

New cyber insurance claims data from cyber risk company Resilience reveals a dramatic evolution in the economics of cybercrime. An analysis of claims across...

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive...

Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms

Threat actors are luring unsuspecting users into running trojanized gaming utilities that are distributed via browsers and chat platforms to distribute a remote access...

UT San Antonio recognized for exceptional research in cybersecurity

Two of the university's research-intensive doctoral programs earned a prestigious designation from the NSA. 

This Week’s Top Five Stories in Cyber

Cyber Magazine takes a look at the top stories of this week, featuring Anthropic, Google Cloud, Dragos and CrowdStrike among others 

Meta Files Lawsuits Against Brazil, China, Vietnam Advertisers Over Celeb-Bait Scams

Meta on Thursday said it's taking legal action to tackle scams on its platforms by filing lawsuits against what it calls deceptive advertisers based...

Nebraska’s new cyber chief says CISOs should stop saying no

After being named Nebraska’s interim chief information security officer last month, Bryce Bailey on Tuesday lost his interim status and will serve as the...

Wyden blocks Rudd confirmation to lead Cyber Command, NSA

Sen. Ron Wyden this week pledged to block a vote confirming Lt. Gen. Joshua Rudd as the new head of both U.S. Cyber...

Aeternum C2 Botnet Stores Encrypted Commands on Polygon Blockchain to Evade Takedown

Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure to make it resilient...

Latest articles